menu
QAmmunity.org
Login
Register
My account
Edit my Profile
Private messages
My favorites
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
A _____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal user's messages being processed.
asked
Dec 20, 2018
44.0k
views
0
votes
A _____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal user's messages being processed.
Computers and Technology
college
Sam Upra
asked
by
Sam Upra
7.6k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
2
votes
I think its a virus or a trojan horse
Erubiel
answered
Dec 26, 2018
by
Erubiel
7.6k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Apr 2, 2024
145k
views
A while back, the IT help desk received a number of complaints that one employee's computer was sending out Viagra spam. They checked it out, and the reports were true. A hacker had installed a program
Callidior
asked
Apr 2, 2024
by
Callidior
7.9k
points
Computers and Technology
high-school
1
answer
1
vote
145k
views
asked
Sep 10, 2021
151k
views
Jeff is part of a group that is trying to reduce what it sees as rampant commercialism in all of our mass media. By sending out counter-messages, Jeff's group hopes to disrupt efforts by the corporate
Waltzy
asked
Sep 10, 2021
by
Waltzy
8.0k
points
Business
high-school
1
answer
2
votes
151k
views
asked
Jul 21, 2024
69.5k
views
1)Which type of hacker attempts to probe a system with an organization's permission for weaknesses and then privately report back to that organization? a. Gray hat hackers b. Black hat hackers c. White
Dany Y
asked
Jul 21, 2024
by
Dany Y
7.8k
points
Engineering
college
2
answers
5
votes
69.5k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
“What does it mean when we “rework” copyrighted material?”
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
Seven basic internal components found in a computer tower
Please help me ! All you do is just put it it all in your own words ! Please this is for my reported card!i don't know how to put it in my own words because my English is not that good!
Explain why binary codes are used to represent characters, numbers and symbols :)
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search QAmmunity.org